Hello - I did some searching around and didn't really find anything related to securing a rooted xoom. Other than the av, are there any other steps us semi technical, enough to be dangerous, xoom users should be doing to make sure our xoom is only being used by us?
This came up right before I placed my private RSA keys on the sd card to attempt to figure out how I can use my ssh keys to get into systems from my xoom. Which is another question. where do I securly store my ssh RSA keys to be used in outgoing ssh connections from my xoom?
- set root password?
- firewall app?
- disable any running services?
Thanks ahead of time for any constructive comments.
-Damian